Multicast Security Using RSA for Inter Cluster Communication with Rekeying in MANET

نویسنده

  • G. Sankara Rao
چکیده

In Wireless networks, nodes can communicate through base stations. In this scenario, the communication process takes more time to complete. To reduce this delay time, a Mobile Ad hoc Network is introduced. A Mobile ad hoc Network (MANET) is an infrastructure less network. In this, each node acts as a base station and is responsible for dynamically discovering other nodes it can directly communicate with. In a MANET, message delivery can speed up by means of group communication. In an adversarial ad hoc environment such as in military or public emergency network applications, it is necessary to provide secure multicast or group communication. For the secure group communication, there is a process of generating, distributing and updating keys to the network nodes is called key management. One of the key management schemes is group key management scheme. In this scheme updating of keys for newly joining or leaving nodes in a group is done by rekeying technique. In the existing system, the authors have employed a technique using One-way Function Chain (OFC) for key generation. In the proposed research, the keys are generated randomly and encrypted the generated keys using RSA algorithm before the keys are assigned to the nodes in clusters. This technique is simulated in network simulator tool (NS2). Key WordsAd Hoc, MANET, DSDV, DSR, AODV, AOMDV, QoS, NS2

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome t...

متن کامل

Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks

We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distributing rekeying messages and specify techniques for joining and leaving a group. Access control in multicast system is usually achieved by encrypting the content using an encryption key, known as the group key (sessi...

متن کامل

Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network

In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. However, in RMRA, the rekeying is carried out after a specific interval of time, which cannot ensure the security for multicast communication on joining the member. Secondly, the rekeying scheme generates a huge comm...

متن کامل

Secure MANET Communication Using Cluster Based Multicast with Fair Key and Resource Scheduler

In current Mobile Adhoc Network (MANET) scenario of social network, Delay Tolerant Networks (DTNs) are needed to handle frequent network partitions and large end-to-end delays for efficient multicasting. Existing scheme presented adaptive multicast routing to handle multicast delivery schemes for DTNs. However performance and reliability obtained on sparsely connected nodes in the MANET social ...

متن کامل

Efficient rekeying algorithms for WiMAX networks

In this paper, we study the rekeying issue in IEEE 802.16e WiMAX networks. The existing rekeying scheme—the Multicast and Broadcast Rekeying Algorithm (MBRA) unicasts new keys to each subscriber station (SS). This scheme does not scale well since it incurs large communication overheads when the number of SSs increase. In our work, first we propose a general tree-based rekeying scheme, which is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016